March-April 2018 test results: More insights into industry AV tests

Credit to Author: Windows Defender ATP| Date: Fri, 20 Jul 2018 19:30:38 +0000

In a previous post, in the spirit of our commitment to delivering industry-leading protection, customer choice, and transparency on the quality of our solutions, we shared insights and context into the results of AV-TESTs January-February 2018 test cycle. We released a transparency report to help our customers and the broader security community to stay informed

Read more

Read more

The rise of the extended enterprise in today’s digital economy

Credit to Author: Jean-Pascal Tricoire| Date: Fri, 13 Jul 2018 14:18:24 +0000

The concept of an “extended enterprise”—that is, a network of partner relationships—is not new. A single company cannot operate successfully in a silo to serve its customers best. Instead, a… Read more »

The post The rise of the extended enterprise in today’s digital economy appeared first on Schneider Electric Blog.

Read more

Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis

Credit to Author: Windows Defender ATP| Date: Wed, 11 Jul 2018 18:50:14 +0000

Much of cybercrime today is fueled by underground markets where malware and cybercriminal services are available for purchase. These markets in the deep web commoditize malware operations. Even novice cybercriminals can buy malware toolkits and other services they might need for malware campaigns: encryption, hosting, antimalware evasion, spamming, and many others. Hawkeye Keylogger (also known

Read more

Read more

Machine learning vs. social engineering

Credit to Author: Windows Defender ATP| Date: Thu, 07 Jun 2018 13:00:56 +0000

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Just in the last few months, machine learning has helped us to protect hundreds of thousands of customers against ransomware,

Read more

Read more

Taking apart a double zero-day sample discovered in joint hunt with ESET

Credit to Author: Windows Defender ATP| Date: Mon, 02 Jul 2018 15:00:00 +0000

In late March 2018, I analyzed an interesting PDF sample found by ESET senior malware researcher Anton Cherpanov. The sample was initially reported to Microsoft as a potential exploit for an unknown Windows kernel vulnerability. During my investigation in parallel with ESET researchers, I was surprised to discover two new zero-day exploits in the same

Read more

Read more

Building Zero Trust networks with Microsoft 365

Credit to Author: Windows Defender ATP| Date: Thu, 14 Jun 2018 15:00:35 +0000

The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, todays increasingly mobile workforce, the migration towards public cloud services, and the adoption of Bring Your Own Device (BYOD) model make perimeter security controls irrelevant. Networks that fail to evolve from traditional

Read more

Read more

3 Steps Towards Cybersecurity in a Digital World

Credit to Author: Hervé Coureil| Date: Tue, 12 Jun 2018 21:05:46 +0000

“Security is everyone’s job now.” These are wise words from Amazon’s CTO Dr. Werner Vogels, especially for companies embarking on a digital transformation or accelerating their journey. Why should we… Read more »

The post 3 Steps Towards Cybersecurity in a Digital World appeared first on Schneider Electric Blog.

Read more

Manufacturing Cybersecurity: Are Your Industrial Control Systems REALLY Protected?

Credit to Author: Guest Blogger| Date: Mon, 11 Jun 2018 19:39:19 +0000

Gary Gillespie is the Vice President of MDT Software. Gary has over 25 years of experience in design, operations, safety, and software development. He holds a Bachelors of Science in… Read more »

The post Manufacturing Cybersecurity: Are Your Industrial Control Systems REALLY Protected? appeared first on Schneider Electric Blog.

Read more